Computer Networking which of the following is not a field in the Ethernet Message packet? Pin-code Address Type Data Pin-code Address Type Data ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a unicast address? These are like private addresses in IPv4 in that they are not meant to be routed. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error? None of these one bit or any odd number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a block of data during transmission two bits or any even number of bits inverted in a block during transmission two bits or any even number of bits inverted in a byte during transmission None of these one bit or any odd number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a block of data during transmission two bits or any even number of bits inverted in a block during transmission two bits or any even number of bits inverted in a byte during transmission ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the usual number of bits transmitted simultaneously in parallel data transmission used by microcomputers? 9 8 16 4 None of these 9 8 16 4 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A data communications system has: 4 components 5 components 6 components 7 components 4 components 5 components 6 components 7 components ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 1 only 3 only 1, 3 and 4 3 and 4 1 only 3 only 1, 3 and 4 3 and 4 ANSWER DOWNLOAD EXAMIANS APP